Wireless sensor networks have recently received a high level of attention due to their wide applications in military and civilian operations. This book discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. It includes a fairly new study on capabilities of mu-TESLA, a broadcast authentication technique for wireless sensor networks. This volume assists both professionals and students to understand background knowledge in wireless sensor network security and prepare them for producing research in this domain. The book is designed for a professional audience composed of researchers and practitioners in industry. It is also suitable as a secondary text for graduate-level students in computer science.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Wireless sensor networks have recently received a high level of attention due to their wide applications in military and civilian operations.
Security for Wireless Sensor Networks discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. This volume assists both professionals and students to understand background knowledge in wireless sensor network security and prepare them for producing research in this domain.
Security for Wireless Sensor Networks is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 29,00 für den Versand von Vereinigtes Königreich nach Deutschland
Versandziele, Kosten & DauerGratis für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerAnbieter: moluna, Greven, Deutschland
Zustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Includes example applications for target tracking, scientific exploration and data acquisition in hazardous environmentsIncludes a fairly new study on capabilities of mu-TESLA, a broadcast authentication technique for wireless sensor networks. Bestandsnummer des Verkäufers 4174455
Anzahl: Mehr als 20 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Bestandsnummer des Verkäufers ria9781441940988_new
Anzahl: Mehr als 20 verfügbar
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monitor and report the conditions and events in their local environments. A large collection of these sensor nodes can thus form a wireless sensor network in an ad hoc manner, creating a new type of information systems. Such sensor networks have recently emerged as an important means to study and interact with the physical world and have received a lot of attention due to their wide applications in military and civilian operations such as target tracking and data acquisition. However, in many of these applications, wireless sensor networks could be deployed in hostile environments where there are malicious attacks against the network. Providing security services in sensor networks, however, turns out to be a very challenging task. First, sensor nodes usually have limited resources such as storage, bandwidth, computation and energy. It is often undesirable to implement expensive algorithms (e. g. , frequent public key operations) on sensor nodes. Second, sensor nodes are usually deployed unattended and built without compromise prevention in mind. An attacker can easily capture and compromise a few sensor nodes without being noticed. When sensor nodes are compromised, the attacker can learn all the secrets stored on them and launch a variety of attacks. Thus, any security mechanism for sensor networks has to be resilient to compromised sensor nodes.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 224 pp. Englisch. Bestandsnummer des Verkäufers 9781441940988
Anzahl: 2 verfügbar
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. It contains example applications for target tracking, scientific exploration and data acquisition in hazardous environments, and includes a fairly new study on capabilities of mu-TESLA, a broadcast authentication technique for wireless sensor networks. The book assists both professionals and students to understand background knowledge in wireless sensor network security and prepare them for producing research in this domain. 224 pp. Englisch. Bestandsnummer des Verkäufers 9781441940988
Anzahl: 2 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monitor and report the conditions and events in their local environments. A large collection of these sensor nodes can thus form a wireless sensor network in an ad hoc manner, creating a new type of information systems. Such sensor networks have recently emerged as an important means to study and interact with the physical world and have received a lot of attention due to their wide applications in military and civilian operations such as target tracking and data acquisition. However, in many of these applications, wireless sensor networks could be deployed in hostile environments where there are malicious attacks against the network. Providing security services in sensor networks, however, turns out to be a very challenging task. First, sensor nodes usually have limited resources such as storage, bandwidth, computation and energy. It is often undesirable to implement expensive algorithms (e. g. , frequent public key operations) on sensor nodes. Second, sensor nodes are usually deployed unattended and built without compromise prevention in mind. An attacker can easily capture and compromise a few sensor nodes without being noticed. When sensor nodes are compromised, the attacker can learn all the secrets stored on them and launch a variety of attacks. Thus, any security mechanism for sensor networks has to be resilient to compromised sensor nodes. Bestandsnummer des Verkäufers 9781441940988
Anzahl: 1 verfügbar
Anbieter: THE SAINT BOOKSTORE, Southport, Vereinigtes Königreich
Paperback / softback. Zustand: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 351. Bestandsnummer des Verkäufers C9781441940988
Anzahl: Mehr als 20 verfügbar
Anbieter: Lucky's Textbooks, Dallas, TX, USA
Zustand: New. Bestandsnummer des Verkäufers ABLIING23Mar2411530295585
Anzahl: Mehr als 20 verfügbar
Anbieter: Books Puddle, New York, NY, USA
Zustand: New. pp. 224. Bestandsnummer des Verkäufers 263091004
Anzahl: 4 verfügbar
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: New. PRINT ON DEMAND pp. 224. Bestandsnummer des Verkäufers 183090998
Anzahl: 4 verfügbar
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. Print on Demand pp. 224 83 Illus. Bestandsnummer des Verkäufers 5805539
Anzahl: 4 verfügbar